I think you're applying this single password per account incorrectly, and I started this way too.
With ssh keys you want to optimize for revocation. This means I key per server. If your work system is compromised, then all keys are compromised and you need to find and revoke each.
If you contribute to personal repo at work the use the work key and it is clear to remove when done with the work computer.
For further actions, you may consider blocking this person and/or reporting abuse
We're a place where coders share, stay up-to-date and grow their careers.
I think you're applying this single password per account incorrectly, and I started this way too.
With ssh keys you want to optimize for revocation. This means I key per server. If your work system is compromised, then all keys are compromised and you need to find and revoke each.
If you contribute to personal repo at work the use the work key and it is clear to remove when done with the work computer.